-
Use the Download button on www.cursor.com web site. It will download the
NAME.AppImage
file. -
Copy the .AppImage file to your Applications directory
cd ~/Downloads
mkdir -p ~/Applications
mv NAME.AppImage ~/Applications/cursor.AppImage
Use the Download button on www.cursor.com web site. It will download the NAME.AppImage
file.
Copy the .AppImage file to your Applications directory
cd ~/Downloads
mkdir -p ~/Applications
mv NAME.AppImage ~/Applications/cursor.AppImage
package test.app.config; | |
import com.zaxxer.hikari.HikariDataSource; | |
import org.springframework.beans.factory.annotation.Qualifier; | |
import org.springframework.boot.context.properties.ConfigurationProperties; | |
import org.springframework.boot.jdbc.DataSourceBuilder; | |
import org.springframework.context.annotation.Bean; | |
import org.springframework.context.annotation.Configuration; | |
import org.springframework.context.annotation.DependsOn; | |
import org.springframework.jdbc.core.namedparam.NamedParameterJdbcTemplate; |
[run] | |
branch = True | |
source = my_django_lib | |
omit = | |
src/my_django_lib/settings.py | |
*/__init__.py | |
[paths] | |
source = src |
# -- read csv files from tar.gz in S3 with S3FS and tarfile (https://s3fs.readthedocs.io/en/latest/) | |
bucket = 'mybucket' | |
key = 'mycompressed_csv_files.tar.gz' | |
import s3fs | |
import tarfile | |
import io | |
import pandas as pd |
(To be improved)
http
command) — pip install httpie
git-branch-protection.sh
as git-branch-protection
somewhere in your path (something like ~/bin
or ~/.local/bin
if you already use it)~/.config/github_token
.<script src="https://cdn.jsdelivr.net/npm/@tensorflow/[email protected]"></script> | |
<script src="https://cdnjs.cloudflare.com/ajax/libs/Chart.js/2.7.2/Chart.bundle.min.js"></script> | |
<div style="width:400px;"> | |
<canvas id="myChart" width="400" height="400"></canvas> | |
</div> | |
<button onclick="train()">Train the model 1 step</button> | |
<script> | |
const trainX = [ | |
3.3, |
import imp | |
from functools import partial | |
from mock.mock import _patch, _get_target, DEFAULT | |
class PatchWithReload(_patch): | |
def __init__(self, module_to_reload, *args, **kwargs): | |
self.module_to_reload = module_to_reload | |
super(PatchWithReload, self).__init__(*args, **kwargs) |
```python | |
import collections , yaml | |
_mapping_tag = yaml.resolver.BaseResolver.DEFAULT_MAPPING_TAG | |
def dict_representer(dumper, data): | |
return dumper.represent_mapping(_mapping_tag, data.iteritems()) | |
def dict_constructor(loader, node): | |
return collections.OrderedDict(loader.construct_pairs(node)) |
import {Pipe} from '@angular/core'; | |
import {DomSanitizer, SafeHtml, SafeStyle, SafeScript, SafeUrl, SafeResourceUrl} from '@angular/platform-browser'; | |
//https://forum.ionicframework.com/t/inserting-html-via-angular-2-use-of-domsanitizationservice-bypasssecuritytrusthtml/62562/2 | |
@Pipe({ | |
name: 'safe' | |
}) | |
export class SafePipe { | |
constructor(protected _sanitizer: DomSanitizer) { |